The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for intrusion with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1984-1991 (15) 1992-1994 (22) 1995-1996 (19) 1997 (21) 1998 (21) 1999 (101) 2000 (82) 2001 (116) 2002 (179) 2003 (304) 2004 (453) 2005 (612) 2006 (626) 2007 (603) 2008 (674) 2009 (552) 2010 (420) 2011 (377) 2012 (338) 2013 (307) 2014 (319) 2015 (323) 2016 (370) 2017 (441) 2018 (595) 2019 (702) 2020 (790) 2021 (953) 2022 (1105) 2023 (1303) 2024 (309)
Publication types (Num. hits)
article(5186) book(16) data(15) incollection(79) inproceedings(7542) phdthesis(194) proceedings(20)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3828 occurrences of 1280 keywords

Results
Found 13052 publication records. Showing 13052 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
24Shengyi Jiang, Qinghua Li, Hui Wang A Novel Intrusion Detection Method. Search on Bibsonomy NPC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Andrea Bosin, Nicoletta Dessì, Barbara Pes Engineering Knowledge Discovery in Network Intrusion Detection. Search on Bibsonomy IDEAL The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Luigi P. Cordella, Alessandro Limongiello, Carlo Sansone Network Intrusion Detection by a Multi-stage Classification System. Search on Bibsonomy Multiple Classifier Systems The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Gang Kou, Yi Peng 0001, Yong Shi 0001, Zhengxin Chen, Xiaojun Chen 0001 A Multiple-Criteria Quadratic Programming Approach to Network Intrusion Detection. Search on Bibsonomy CASDMKM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Thomas Holz 0002 An Efficient Distributed Intrusion Detection Scheme. Search on Bibsonomy COMPSAC Workshops The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Wei Wang 0012, Xiaohong Guan, Xiangliang Zhang 0001 A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. Search on Bibsonomy ISNN (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Andrew H. Sung, Srinivas Mukkamala The Feature Selection and Intrusion Detection Problems. Search on Bibsonomy ASIAN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Alex Hai Wang, Peng Liu 0005, Lunquan Li Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Narasimha Prasad Subraveti, Soontaree Tanaraksiritavorn, Shivakant Mishra Flexible Intrusion Tolerant Group Membership Protocol. Search on Bibsonomy ICPADS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24HariGovind V. Ramasamy, Adnan Agbaria, William H. Sanders CoBFIT: A Component-Based Framework for Intrusion Tolerance. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Danny Hesse, Jana Dittmann, Andreas Lang 0001 Network Based Intrusion Detection to Detect Steganographic Communication Channels - On the Example of Images. Search on Bibsonomy EUROMICRO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Hyeong-Ju Kim, Byoung-Koo Kim, Ik-Kyun Kim Implementation and Performance Evaluation of High-Performance Intrusion Detection and Response System. Search on Bibsonomy ICCSA (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Byoung-Koo Kim, Ik-Kyun Kim, Ki-Young Kim, Jongsoo Jang Design and Implementation of High-Performance Intrusion Detection System. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sung Baik, Jerzy W. Bala A Decision Tree Algorithm for Distributed Data Mining: Towards Network Intrusion Detection. Search on Bibsonomy ICCSA (4) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Hyeyoung Cho, Daeyoung Kim 0001, Juhong Kim, Yoonmee Doh, Jongsoo Jang Network Processor Based Network Intrusion Detection System. Search on Bibsonomy ICOIN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Jianguo Ding, Shihao Xu, Bernd J. Krämer, Yingcai Bai, Hansheng Chen 0003, Jun Zhang Probabilistic Inference Strategy in Distributed Intrusion Detection Systems. Search on Bibsonomy ISPA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Sampada Chavan, Khusbu Shah, Neha Dave, Sanghamitra Mukherjee, Ajith Abraham, Sugata Sanyal Adaptive Neuro-Fuzzy Intrusion Detection Systems. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Yevgeniy Dodis, Matthew K. Franklin, Jonathan Katz, Atsuko Miyaji, Moti Yung A Generic Construction for Intrusion-Resilient Public-Key Encryption. Search on Bibsonomy CT-RSA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Giovanni Vigna, Sumit Gwalani, Kavitha Srinivasan, Elizabeth M. Belding-Royer, Richard A. Kemmerer An Intrusion Detection Tool for AODV-Based Ad hoc Wireless Networks. Search on Bibsonomy ACSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Javier Carbo Rubiera, Agustín Orfila, Arturo Ribagorda Adaptive Agents Applied to Intrusion Detection. Search on Bibsonomy CEEMAS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Ioannis Charitakis, Dionisios N. Pnevmatikatos, Evangelos P. Markatos, Kostas G. Anagnostakis Code Generation for Packet Header Intrusion Analysis on the IXP1200 Network Processor. Search on Bibsonomy SCOPES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Mikhail Petrovskiy A Fuzzy Kernel-Based Method for Real-Time Network Intrusion Detection. Search on Bibsonomy IICS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Mohamed Layouni, Jozef Hooman, Sofiène Tahar On the Correctness of an Intrusion-Tolerant Group Communication Protocol. Search on Bibsonomy CHARME The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Akira Kanaoka, Eiji Okamoto Multivariate Statistical Analysis of Network Traffic for Intrusion Detection. Search on Bibsonomy DEXA Workshops The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Francisco J. Martín, Enric Plaza SOID: An Ontology for Agent-Aided Intrusion Detection. Search on Bibsonomy KES The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Yuebin Bai, Hidetsune Kobayashi Intrusion Detection System: Technology and Development. Search on Bibsonomy AINA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Zhuowei Li 0001, Amitabha Das, Sukumar Nandi Utilizing Statistical Characteristics of N-grams for Intrusion Detection. Search on Bibsonomy CW The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Tatyana Ryutov, B. Clifford Neuman, Dong-Ho Kim Dynamic Authorization and Intrusion Response in Distributed Systems. Search on Bibsonomy DISCEX (1) The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Noria Foukia, Salima Hassas, Serge Fenet, Paul Albuquerque Combining Immune Systems and Social Insect Metaphors: A Paradigm for Distributed Intrusion Detection and Response System. Search on Bibsonomy MATA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou 0001, Kenneth E. Rowe Log Correlation for Intrusion Detection: A Proof of Concept. Search on Bibsonomy ACSAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Salem Benferhat, Fabien Autrel, Frédéric Cuppens Enhanced Correlation in an Intrusion Detection Process. Search on Bibsonomy MMM-ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24William La Cholter, Priya Narasimhan, Daniel F. Sterne, Ravindra Balupari, Kelly Djahandari, Arvind Mani, Sandra L. Murphy IBAN: Intrusion Blocker Based on Active Networks. Search on Bibsonomy DANCE The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Gordon Thomas Rohrmair, Gavin Lowe Using CSP to Detect Insertion and Evasion Possibilities within the Intrusion Detection Area. Search on Bibsonomy FASec The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Kymie M. C. Tan, Roy A. Maxion "Why 6?" Defining the Operational Limits of Stide, an Anomaly-Based Intrusion Detector. Search on Bibsonomy S&P The full citation details ... 2002 DBLP  DOI  BibTeX  RDF anomaly detector coverage, minimal foreign sequence, stide, performance evaluation, Anomaly detection
24Gene Itkis, Leonid Reyzin SiBIR: Signer-Base Intrusion-Resilient Signatures. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Thomas Toth, Christopher Krügel Evaluating the Impact of Automated Intrusion Response Mechanisms. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Peng Liu 0005 Architectures for Intrusion Tolerant Database Systems. Search on Bibsonomy ACSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
24Tim Buchheim, Michael Erlinger, Benjamin S. Feinstein, Gregory A. Matthews, Roy Pollock, Joseph Betser, Andy Walther Implementing the Intrusion Detection Exchange Protocol. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Tao Wan, Xue Dong Yang IntruDetector: A Software Platform for Testing Network Intrusion Detection Algorithms. Search on Bibsonomy ACSAC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
24Yongguang Zhang, Wenke Lee Intrusion detection in wireless ad-hoc networks. Search on Bibsonomy MobiCom The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
24Richard C. Linger Systematic Generation of Stochastic Diversity as an Intrusion Barrier in Survivable Systems Software. Search on Bibsonomy HICSS The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
24Wenke Lee, Salvatore J. Stolfo, Kui W. Mok A Data Mining Framework for Building Intrusion Detection Models. Search on Bibsonomy S&P The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Jiannan Liu, Kun Xiao, Lei Luo 0004, Yun Li, Lirong Chen An intrusion detection system integrating network-level intrusion detection and host-level intrusion detection. Search on Bibsonomy QRS The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
23Chuanxi Cai, Shue Mei, Weijun Zhong Configuration of intrusion prevention systems based on a legal user: the case for using intrusion prevention systems instead of intrusion detection systems. Search on Bibsonomy Inf. Technol. Manag. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
23Ill-Young Weon, Doo Heon Song 0001, Chang-Hoon Lee Effective Intrusion Detection Model through the Combination of a Signature-based Intrusion Detection System and a Machine Learning-based Intrusion Detection System. Search on Bibsonomy J. Inf. Sci. Eng. The full citation details ... 2006 DBLP  BibTeX  RDF
23Antonis Papadogiannakis, Michalis Polychronakis, Evangelos P. Markatos Improving the accuracy of network intrusion detection systems under load using selective packet discarding. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF selective packet discarding, intrusion detection, overload control
23Natalia Stakhanova, Ali A. Ghorbani 0001 Managing intrusion detection rule sets. Search on Bibsonomy EUROSEC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF detection rules, intrusion detection signatures
23Vadim D. Kotov, Vladimir I. Vasilyev Artificial immune system based intrusion detection system. Search on Bibsonomy SIN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF negative selection algorithms, artificial immune system, intrusion detection system, system calls
23Iren Lorenzo-Fonseca, Francisco Maciá Pérez, Francisco José Mora-Gimeno, Rogelio Lau-Fernández, Juan Antonio Gil-Martínez-Abarca, Diego Marcos-Jorquera Intrusion Detection Method Using Neural Networks Based on the Reduction of Characteristics. Search on Bibsonomy IWANN (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Neural networks, Intrusion detection, Principal component analysis, Anomaly detection
23Arjun Guha, Shriram Krishnamurthi, Trevor Jim Using static analysis for Ajax intrusion detection. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF intrusion detection, javascript, Ajax, control-flow analysis
23Floriano De Rango, Salvatore Marano Trust-based SAODV protocol with intrusion detection and incentive cooperation in MANET. Search on Bibsonomy IWCMC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SAODV, security, MANET, intrusion detection
23Zorana Bankovic, José Manuel Moya, Álvaro Araujo, Juan-Mariano de Goyeneche Intrusion Detection in Sensor Networks Using Clustering and Immune Systems. Search on Bibsonomy IDEAL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF genetic algorithms, wireless sensor networks, intrusion detection, self-organizing maps, immune systems
23Toshikazu Uemura, Tadashi Dohi, Naoto Kaio Availability Analysis of a Scalable Intrusion Tolerant Architecture with Two Detection Modes. Search on Bibsonomy CloudCom The full citation details ... 2009 DBLP  DOI  BibTeX  RDF SITAR, detection mode, EMC approach, cloud computing circumstance, availability, intrusion tolerance, discrete-time modeling
23Dhiman Barman, Jaideep Chandrashekar, Nina Taft, Michalis Faloutsos, Ling Huang, Frédéric Giroire Impact of IT monoculture on behavioral end host intrusion detection. Search on Bibsonomy WREN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF host intrusion detection, measurement, anomaly detection, user profile, enterprise management
23Martin Rehák, Eugen Staab, Volker Fusenig, Jan Stiborek, Martin Grill, Karel Bartos, Michal Pechoucek, Thomas Engel 0001 Threat-model-driven runtime adaptation and evaluation of intrusion detection system. Search on Bibsonomy ICAC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF network behavior analysis, intrusion detection, self-adaptation, attack trees
23Meijuan Gao, Jingwen Tian, Shi-Ru Zhou Community Intrusion Detection System Based on Radial Basic Probabilistic Neural Network. Search on Bibsonomy ISNN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Radial Basic Probabilistic Neural Network, Community, Intrusion Detection, Face Recognition
23Nawa Ngamwitthayanon, Naruemon Wattanapongsakorn, David W. Coit Investigation of Fuzzy Adaptive Resonance Theory in Network Anomaly Intrusion Detection. Search on Bibsonomy ISNN (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF One Shot Fast Learning, Intrusion Detection, Adaptive Learning, Network Anomaly Detection, Fuzzy-Adaptive Resonance Theory
23Garfield Zhiping Wu, Sylvia L. Osborn, Xin Jin Database Intrusion Detection Using Role Profiling with Role Hierarchy. Search on Bibsonomy Secure Data Management The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Role profiling, Intrusion detection, RBAC, Database security, Insider threats
23Ghassan Ahmed Ali, Aman Jantan, Abdulghani Ali Honeybee-Based Model to Detect Intrusion. Search on Bibsonomy ISA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF honeybee, intrusion detection, network security, natural computing
23Suvasini Panigrahi, Shamik Sural Detection of Database Intrusion Using a Two-Stage Fuzzy System. Search on Bibsonomy ISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Fuzzy-Bayesian inference, Suspicion score, Fuzzy logic, Intrusion detection, Database security
23Mati Pinyathinun, Chanboon Sathitwiriyawong Dynamic policy model for target based intrusion detection system. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF target based IDS, performance, intrusion detection system
23Martin Rehák, Eugen Staab, Michal Pechoucek, Jan Stiborek, Martin Grill, Karel Bartos Dynamic information source selection for intrusion detection systems. Search on Bibsonomy AAMAS (2) The full citation details ... 2009 DBLP  BibTeX  RDF security, trust, intrusion detection, service selection
23Pei-Te Chen, Chi-Sung Laih IDSIC: an intrusion detection system with identification capability. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Identification capability, System managers (SMs), Security auditors (SAs), Fingerprints, Intrusion detection systems (IDSs)
23Changqiong Shi, Dawei Wang, Hui Huang, Dafang Zhang Network Intrusion Rules Extraction Based on Rough Set and Niche Genetic Algorithm. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Rough sets, Rules Extraction, Niche, Network Intrusion
23Esteban J. Palomo, Enrique Domínguez, Rafael Marcos Luque, José Muñoz A Competitive Neural Network for Intrusion Detection Systems. Search on Bibsonomy MCO The full citation details ... 2008 DBLP  DOI  BibTeX  RDF data mining, network security, intrusion detection system, Competitive learning
23Guofei Gu, Alvaro A. Cárdenas, Wenke Lee Principled reasoning and practical applications of alert fusion in intrusion detection systems. Search on Bibsonomy AsiaCCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IDS ensemble, alert fusion, intrusion detection, ROC curve, likelihood ratio test
23Atul Mahajan, Benfano Soewito, Sai K. Parsi, Ning Weng, Haibo Wang 0005 Implementing high-speed string matching hardware for network intrusion detection systems. Search on Bibsonomy FPGA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF FPGA, string matching, network intrusion detection systems
23Ulf Larson, Erland Jonsson, Stefan Lindskog A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion detection, Taxonomy, Data collection
23Marianne Azer, Sherif El-Kassas, Abdel Wahab F. Hassan, Magdy S. El-Soudani Intrusion Detection for Wormhole Attacks in Ad hoc Networks: A Survey and a Proposed Decentralized Scheme. Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Security, Ad Hoc Networks, Intrusion Detection, Wormhole Attack
23Anazida Zainal, Mohd Aizaini Maarof, Siti Mariyam Hj. Shamsuddin Data Reduction and Ensemble Classifiers in Intrusion Detection. Search on Bibsonomy Asia International Conference on Modelling and Simulation The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ANFIS and LGP, intrusion detection, ensemble
23Sevil Sen, John A. Clark Evolving Intrusion Detection Rules on Mobile Ad Hoc Networks. Search on Bibsonomy PRICAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF MANETs, intrusion detection, Grammatical evolution
23Kreangsak Tamee, Pornthep Rojanavasu, Sonchai Udomthanapong, Ouen Pinngern Using Self-Organizing Maps with Learning Classifier System for Intrusion Detection. Search on Bibsonomy PRICAI The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Intrusion Detection, Self-Organizing Map, LCS
23Mário Antunes 0002, Manuel Eduardo Correia TAT-NIDS: An Immune-Based Anomaly Detection Architecture for Network Intrusion Detection. Search on Bibsonomy IWPACBB The full citation details ... 2008 DBLP  DOI  BibTeX  RDF tunable activation threshold, anomaly detection, artificial immune system, network intrusion detection
23Zhuo Ning, Jian Gong A Sampling Method for Intrusion Detection System. Search on Bibsonomy APNOMS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF multistage bloom filter, feature entropy, sampling, Intrusion detection system
23Yeim-Kuan Chang, Ming-Li Tsai, Yu-Ru Chung Multi-Character Processor Array for Pattern Matching in Network Intrusion Detection System. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, pattern matching, processor array, Snort
23Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems. Search on Bibsonomy AINA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network intrusion detection, TCAM
23Robert Lee, Sheau-Dong Lang Locality-Based Server Profiling for Intrusion Detection. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF intrusion detection, local area networks, network servers, Computer network security
23Alysson Neves Bessani, Hans P. Reiser, Paulo Sousa 0001, Ilir Gashi, Vladimir Stankovic 0002, Tobias Distler, Rüdiger Kapitza, Alessandro Daidone, Rafael R. Obelheiro FOREVER: Fault/intrusiOn REmoVal through Evolution & Recovery. Search on Bibsonomy Middleware (Companion) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF replication, intrusion tolerance, proactive recovery
23M. Patrick Collins, Michael K. Reiter On the Limits of Payload-Oblivious Network Attack Detection. Search on Bibsonomy RAID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF evaluation, network intrusion detection, ROC curve
23Mohammad Zulkernine, Mathew Graves, Muhammad Umair Ahmed Khan Integrating software specifications into intrusion detection. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Software specification languages, Intrusion detection, State machines, Attack scenarios
23Jungwon Kim, Peter J. Bentley, Uwe Aickelin, Julie Greensmith, Gianni Tedesco, Jamie Twycross Immune system approaches to intrusion detection - a review. Search on Bibsonomy Nat. Comput. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF artificial immune systems, intrusion detection systems, literature review
23Álvaro Herrero 0001, Emilio Corchado, Paolo Gastaldo, Rodolfo Zunino A Comparison of Neural Projection Techniques Applied to Intrusion Detection Systems. Search on Bibsonomy IWANN The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Exploratory Projection Pursuit, Auto-Associative Back-Propagation, Neural Networks, Visualization, Intrusion Detection, Principal Component Analysis, Unsupervised Learning, Computer Network Security
23Nicholas Weaver, Vern Paxson, José M. González The shunt: an FPGA-based accelerator for network intrusion prevention. Search on Bibsonomy FPGA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF FPGA, intrusion detection, hardware acceleration, NIC
23Sungwon Yi, Byoung-Koo Kim, Jintae Oh, Jongsoo Jang, George Kesidis, Chita R. Das Memory-efficient content filtering hardware for high-speed intrusion detection systems. Search on Bibsonomy SAC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF deep packet instpection, FPGA, network security, pattern matching, intrusion detection systems, content filtering
23Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis Intrusion Attack Tactics for the Model Checking of e-Commerce Security Guarantees. Search on Bibsonomy SAFECOMP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF intrusion attacks, e-commerce protocols, model checking, SPIN
23Álvaro Herrero 0001, Emilio Corchado, Paolo Gastaldo, Davide Leoncini, Francesco Picasso, Rodolfo Zunino Intrusion Detection at Packet Level by Unsupervised Architectures. Search on Bibsonomy IDEAL The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Auto Associative Back Propagation, Network Security, Self-Organizing Map, Intrusion Detection System, Vector Quantization
23Veselina G. Jecheva, Evgeniya P. Nikolova Decoding efficiency of the MAP and the max-log MAP algorithm as a strategy in anomaly-based intrusion detection systems. Search on Bibsonomy CompSysTech The full citation details ... 2007 DBLP  DOI  BibTeX  RDF max log MAP algorithm, maximum a posteriori (MAP) algorithm, maximum likelihood (ML) criterion, hidden Markov models (HMM), intrusion detection, gradient method
23Guolong Chen, Qingliang Chen, Wenzhong Guo A PSO-Based Approach to Rule Learning in Network Intrusion Detection. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Intrusion Detection, Particle Swarm Optimization (PSO), Rule Learning
23Iosif-Viorel Onut, Ali A. Ghorbani 0001 Features vs. Attacks: A Comprehensive Feature Selection Model for Network Based Intrusion Detection Systems. Search on Bibsonomy ISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Feature evaluation, Network Intrusion Detection
23Byoung-Koo Kim, Seungyong Yoon, Jintae Oh ATPS - Adaptive Threat Prevention System for High-Performance Intrusion Detection and Response. Search on Bibsonomy APNOMS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF header lookup, intrusion detection, pattern matching
23Fang-Yie Leu, Kai-Wei Hu, Fuu-Cheng Jiang Intrusion Detection and Identification System Using Data Mining and Forensic Techniques. Search on Bibsonomy IWSEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Forensic Features, Identifying Users, Data Mining, Intrusion Detection
23Chundong Wang 0002, He-feng Yu, Huai-bin Wang, Kai Liu SOM-Based Anomaly Intrusion Detection System. Search on Bibsonomy EUC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anomaly-based intrusion detection, U-matrix, cluster, neural network, SOM
23Haiguang Chen, Peng Han, Xi Zhou, Chuanshan Gao Lightweight Anomaly Intrusion Detection in Wireless Sensor Networks. Search on Bibsonomy PAISI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Anomaly intrusion, Key feature, Security, Wireless sensor network, IDSs
23Lin Tan 0001, Timothy Sherwood Architectures for Bit-Split String Scanning in Intrusion Detection. Search on Bibsonomy IEEE Micro The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Bit-split string, intrusion detection, string matching
23Takayuki Itoh, Hiroki Takakura, Atsushi Sawada, Koji Koyamada Hierarchical Visualization of Network Intrusion Detection Data. Search on Bibsonomy IEEE Computer Graphics and Applications The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hierarchical data visualization, IP address space, Intrusion detection system, Rectangle packing
23Anoop Singhal, Sushil Jajodia Data warehousing and data mining techniques for intrusion detection systems. Search on Bibsonomy Distributed Parallel Databases The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Data mining and analysis, Intrusion detection, Data warehouse, OLAP, Computer security
23Juan M. Estévez-Tapiador Book Review: Practical Intrusion Prevention. Search on Bibsonomy IEEE Distributed Syst. Online The full citation details ... 2006 DBLP  DOI  BibTeX  RDF IPS, intrusion prevention systems
23Iosif-Viorel Onut, Ali A. Ghorbani 0001 Toward A Feature Classification Scheme For Network Intrusion Detection. Search on Bibsonomy CNSR The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Feature Extraction, Network Security, Intrusion Detection and Prevention, Feature Classification
23Michel Hurfin, Jean-Pierre Le Narzul, Frédéric Majorczyk, Ludovic Mé, Ayda Saïdane, Eric Totel, Frédéric Tronel A Dependable Intrusion Detection Architecture Based on Agreement Services. Search on Bibsonomy SSS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Intrusion detection, dependability, diversity, COTS, agreement protocols
23Álvaro Herrero 0001, Emilio Corchado, José Manuel Sáiz MOVICAB-IDS: Visual Analysis of Network Traffic Data Streams for Intrusion Detection. Search on Bibsonomy IDEAL The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Exploratory Projection Pursuit, Neural Networks, Intrusion Detection, Multiagent Systems, Unsupervised Learning, Computer Network Security
Displaying result #801 - #900 of 13052 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][17][18][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license